Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

BIND vulnerability protection for Check Point customers

Check Point : 05 August, 2009  (New Product)
IPS solutions from Check Point Technologies provides protection to Windows and UNIX DNS servers against the Berkeley Internet Name Domain vulnerability
Check Point Software Technologies has announced that Check Point IPS products protect customers against a newly discovered Berkeley Internet Name Domain (BIND) vulnerability. The exploit affects both commonly used UNIX and Windows based DNS servers and allows a remote attacker to create a denial-of-service condition.

The Berkeley Internet Name Domain (BIND) is a popular Domain Name System (DNS) implementation from Internet Systems Consortium (ISC). By sending a specially-crafted dynamic update packet to a BIND 9 server, a hacker can cause a denial of service by causing BIND to crash. The exploit is not limited to servers configured to allow dynamic updates.

The vulnerability affects also all servers that are masters of one or more zones and slave servers that are configured to forward updates to their masters. Check Point integrated and dedicated IPS solutions protect against the threat by detecting and blocking maliciously crafted DNS packets.

'BIND is an important building block of the Internet DNS system. Exploits using vulnerabilities in BIND can lead to down-time, phishing and other attacks,' said Oded Gonda, vice president of network security products at Check Point. 'Check Point IPS technologies are a critical security layer to traditional firewalls that will help an enterprise stay ahead of threats and vulnerabilities until servers or clients are patched.'

Check Point's IPS Software Blade, IPS-1 appliances and SmartDefense are supported by Check Point update services, which provides ongoing and real-time updates and configuration advisories for defenses and security policies. Check Point protections are developed and distributed by Check Point's Security Research and Response Centers located around the globe. Users of Check Point SmartDefense are also protected against the new vulnerability.

Based on the Software Blade architecture, Check Point IPS Software Blade provides complete, integrated, next generation firewall intrusion prevention capabilities at multi-gigabit speeds, with preemptive threat coverage for clients, servers, OS and other vulnerabilities, malware/worm infections, and more. Software Blades are independent and flexible security modules that enable companies to select the functions they need to build a custom Check Point Security Gateway.
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo